Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if […]
Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks
As threat actors continue to hop on the train of exploiting CVE-2025-31324, researchers are recommending that SAP administrators patch as soon as possible so that […]
Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed
Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The […]
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet products, after evidence emerged of […]
Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi Guarantee-were forced offline on May […]
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software libraries to deliver malicious payloads […]
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests. This audacious scheme leverages the […]
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous vendors offering seemingly different solutions to the same problem. How does […]
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited […]
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of […]